Impact
An improper length check in Linux's ems_usb driver allows malicious USB bulk messages to be processed, potentially causing a buffer overflow that corrupts kernel memory. This flaw, categorized as CWE‑805, can overwrite critical kernel structures and may lead to denial of service or, if exploited further, arbitrary code execution.
Affected Systems
The vulnerability affects any Linux kernel that includes the ems_usb driver. While the advisory does not list specific release numbers, all distributions shipping a kernel with this driver before the patch are potentially exposed.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% points to a low likelihood of observed exploitation. Based on the description, it is inferred that the attack vector requires a physical or compromised USB device that sends crafted bulk packets to the target system. The issue is not listed in CISA's KEV catalog, suggesting no widespread exploitation is known. Applying the vendor patch remains the best mitigation against this risk.
OpenCVE Enrichment